What is Identity and Access Management?
A set of business process and tools for providing access to the right resources at the right time for the right reasons. Providing visibility into who has access to what and why along with how the access is being used.
IAM is not just about protecting organisations against main threats such as insider threats and credential theft, it is also about business enablement and improving the end-user experience.
Why it matters
According to a survey from The Identity Defined Security Alliance 94% of organizations have had an identity-related breach, which 99% believe could have been prevented.
© Eviden SAS 2024. All rights reserved.
Maturity
0-2 years
2-5 years
5+ years
The landscape
The Move to the cloud and “as a Service models”
This will continue to evolve as tools become cloud-native and are true SaaS tools.
The use of machine learning and behavioral analytics
for a more dynamic or adaptive way of working where decisions are made in near real time.
Extending the role of identities and access beyond people and traditional roles and entitlements
Identities are no longer limited to carbon-based units and are taking the form of devices (e.g. IoT) and applications (e.g. RPA).
Convergence and Cybersecurity Mesh Architecture
Defined by Gartner for centralized security operations, this architecture brings together a flexible architecture to encompass major technologies including SIEM, XDR, Identity and ZTNA to enable better integration and harmonizing output between different products in the detection and response space. It can also drive central intelligence, analytics and policy across different technologies, leading to better ROI.
Key figures
of those technologies are either already adopted by most organizations or will be in the next two years.
of those technologies are expected to be adopted in the next 2 to 5 years cycle.
of those technologies are transformational and wide spread adoption will take over 5 years.